scispace - formally typeset
Search or ask a question
Topic

Trojan

About: Trojan is a research topic. Over the lifetime, 2028 publications have been published within this topic receiving 33209 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: An approach which allows for removal or obfuscation of most forensic evidence is presented and it is demonstrated that a Trojan Horse infection may be a legitimate possibility, even if there is no evidence of an infection on a seized computer's hard drive.
Abstract: In this paper, we review literature on antiforensics published between 2010 and 2016 and reveal the surprising lack of up-to-date research on this topic. This research aims to contribute to this knowledge gap by investigating different antiforensic techniques for devices running Windows 7, one of the most popular operating systems. An approach which allows for removal or obfuscation of most forensic evidence is then presented. Using the Trojan software DarkComet RAT as a case study, we demonstrate the utility of our approach and that a Trojan Horse infection may be a legitimate possibility, even if there is no evidence of an infection on a seized computer's hard drive. Up-to-date information regarding how forensic artifacts can be compromised will allow relevant stakeholders to make informed decisions when deciding the outcome of legal cases involving digital evidence.

8 citations

Proceedings ArticleDOI
15 Jul 2013
TL;DR: A non-destructive, Mahalanobis distance based Trojan detection approach that is validated using power simulation with a 128-bit Advanced Encryption Standard (AES) cipher circuit and shows that Trojans which are 2 orders of magnitude smaller than the AES circuit can be detected.
Abstract: Integrated circuits (ICs) may be inserted malicious circuits as a hardware Trojan during fabrication in untrusted foundries. This poses a significant risk in terms of their trusted field operation. It is extremely difficult to discover such Trojan circuits using conventional testing strategies. In this paper, we propose a non-destructive, Mahalanobis distance based Trojan detection approach. The approach is validated using power simulation with a 128-bit Advanced Encryption Standard (AES) cipher circuit. The experiments show that, Trojans which are 2 orders of magnitude smaller than the AES circuit can be detected by using our Mahalanobis distance based Trojan detection approach.

8 citations

Patent
28 Nov 2012
TL;DR: In this paper, the authors proposed a hardware Trojan horse detection system based on puf, which adds puf into a plurality of modules of an integrated chip (IC) in an original IC design file, sends the IC design files with puf to a factory for production, performs data acquisition on an IC sample produced by the factory according to the IC file with the puf under a test mode, analyzes the acquired data through a data analysis module and outputs a judgment result.
Abstract: The invention relates to a hardware Trojan horse detection system based on puf. The system adds the puf into a plurality of modules of an integrated chip (IC) in an original IC design file, sends the IC design file with the puf to a factory for production, performs data acquisition on an IC sample produced by the factory according to the IC design file with the puf under a test mode, analyzes the acquired data through a data analysis module and outputs a judgment result; and a user judges whether the original IC design in an original data storage module is modified according to original data judged by a data judgment module and judges whether to put the original data into production. The hardware Trojan horse detection system has the advantages that the shortcomings that the conventional detection method is complicated, high in test cost and long in time period, and the original design or the original IC is needed are overcome; whether hardware Trojan horses are contained can be stably and effectively detected; naturally, the fact that the Trojan horses are very difficult to trigger is not considered; the Trojan horses are detected physically; and therefore, most hardware Trojan horses can be detected.

8 citations

Journal ArticleDOI
TL;DR: This paper describes the communication links through a Trojan horse installed into a mobile device and proposes different solutions to avoid this malware and its effects.
Abstract: This paper focuses on the behavior of Trojan horses in mobile devices. This malicious software tries to steal information from a mobile device while the user is unaware. We describe the communication links through a Trojan horse installed into a mobile device. To demonstrate the effects of a Trojan horse infection we present a practical example on a PDA. Via SMS, the malicious user can access a user’s contacts information through the previous installation of the Trojan horse. The results show that this process means a loss of information and a quantified cost to the attacked user too. This paper proposes different solutions to avoid this malware and its effects.

8 citations

Journal ArticleDOI
TL;DR: The TROY project as discussed by the authors used archival radial velocity data of 46 planetary systems to place upper limits on the mass of possible trojans and investigate the presence of co-orbital planets down to several tens of Earth masses.
Abstract: The detection of Earth-like planets, exocomets or Kuiper belts show that the different components found in the solar system should also be present in other planetary systems. Trojans are one of these components and can be considered fossils of the first stages in the life of planetary systems. Their detection in extrasolar systems would open a new scientific window to investigate formation and migration processes. In this context, the main goal of the TROY project is to detect exotrojans for the first time and to measure their occurrence rate (eta-Trojan). In this first paper, we describe the goals and methodology of the project. Additionally, we used archival radial velocity data of 46 planetary systems to place upper limits on the mass of possible trojans and investigate the presence of co-orbital planets down to several tens of Earth masses. We used archival radial velocity data of 46 close-in (P<5 days) transiting planets (without detected companions) with information from high-precision radial velocity instruments. We took advantage of the time of mid-transit and secondary eclipses (when available) to constrain the possible presence of additional objects co-orbiting the star along with the planet. This, together with a good phase coverage, breaks the degeneracy between a trojan planet signature and signals coming from additional planets or underestimated eccentricity. We identify nine systems for which the archival data provide 1-sigma evidence for a mass imbalance between L4 and L5. Two of these systems provide 2-sigma detection, but no significant detection is found among our sample. We also report upper limits to the masses at L4/L5 in all studied systems and discuss the results in the context of previous findings.

8 citations


Network Information
Related Topics (5)
Cloud computing
156.4K papers, 1.9M citations
70% related
Cache
59.1K papers, 976.6K citations
70% related
Planet
27K papers, 980.6K citations
68% related
Compiler
26.3K papers, 578.5K citations
66% related
Key (cryptography)
60.1K papers, 659.3K citations
66% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
2023136
2022282
2021111
2020139
2019144
2018168